Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2024, 06:25
Static task
static1
Behavioral task
behavioral1
Sample
d67ac5e64ec598de0cb673b2fe91d39e0e6266839c65a1aff50d0f4cd04d2902.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d67ac5e64ec598de0cb673b2fe91d39e0e6266839c65a1aff50d0f4cd04d2902.exe
Resource
win10v2004-20240802-en
General
-
Target
d67ac5e64ec598de0cb673b2fe91d39e0e6266839c65a1aff50d0f4cd04d2902.exe
-
Size
788KB
-
MD5
29dc8d45e4b14a4e3073a8844478ff19
-
SHA1
596f9980789d2521d159bd7843a4ab1d589562e0
-
SHA256
d67ac5e64ec598de0cb673b2fe91d39e0e6266839c65a1aff50d0f4cd04d2902
-
SHA512
441d21ff8a100a96ab4b0c7e15ef75a49a67210146864da7176841489f5c88e120fe2465a77ce783adfaff20620be20aed04fea74a743b584be7dd872cc8bb82
-
SSDEEP
12288:e7+3xvhrBVVaUOFH4OVlmgTwvLD3cJzNwOKhVIe:e7CbBVwUOuOU3cZaOIIe
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3116 Logo1_.exe 3128 d67ac5e64ec598de0cb673b2fe91d39e0e6266839c65a1aff50d0f4cd04d2902.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\{6ADF0E6F-E89E-4071-B634-15DAFC87E007}\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmplayer.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\es-MX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\_desktop.ini Logo1_.exe File created C:\Program Files\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Resources\RetailDemo\strings\en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\1.3.36.371\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Resources\Fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sw\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lo\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Audio\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\en\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\server\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ms-MY\View3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe d67ac5e64ec598de0cb673b2fe91d39e0e6266839c65a1aff50d0f4cd04d2902.exe File created C:\Windows\Logo1_.exe d67ac5e64ec598de0cb673b2fe91d39e0e6266839c65a1aff50d0f4cd04d2902.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d67ac5e64ec598de0cb673b2fe91d39e0e6266839c65a1aff50d0f4cd04d2902.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3116 Logo1_.exe 3116 Logo1_.exe 3116 Logo1_.exe 3116 Logo1_.exe 3116 Logo1_.exe 3116 Logo1_.exe 3116 Logo1_.exe 3116 Logo1_.exe 3116 Logo1_.exe 3116 Logo1_.exe 3116 Logo1_.exe 3116 Logo1_.exe 3116 Logo1_.exe 3116 Logo1_.exe 3116 Logo1_.exe 3116 Logo1_.exe 3116 Logo1_.exe 3116 Logo1_.exe 3116 Logo1_.exe 3116 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4528 wrote to memory of 680 4528 d67ac5e64ec598de0cb673b2fe91d39e0e6266839c65a1aff50d0f4cd04d2902.exe 83 PID 4528 wrote to memory of 680 4528 d67ac5e64ec598de0cb673b2fe91d39e0e6266839c65a1aff50d0f4cd04d2902.exe 83 PID 4528 wrote to memory of 680 4528 d67ac5e64ec598de0cb673b2fe91d39e0e6266839c65a1aff50d0f4cd04d2902.exe 83 PID 4528 wrote to memory of 3116 4528 d67ac5e64ec598de0cb673b2fe91d39e0e6266839c65a1aff50d0f4cd04d2902.exe 84 PID 4528 wrote to memory of 3116 4528 d67ac5e64ec598de0cb673b2fe91d39e0e6266839c65a1aff50d0f4cd04d2902.exe 84 PID 4528 wrote to memory of 3116 4528 d67ac5e64ec598de0cb673b2fe91d39e0e6266839c65a1aff50d0f4cd04d2902.exe 84 PID 3116 wrote to memory of 4136 3116 Logo1_.exe 86 PID 3116 wrote to memory of 4136 3116 Logo1_.exe 86 PID 3116 wrote to memory of 4136 3116 Logo1_.exe 86 PID 4136 wrote to memory of 712 4136 net.exe 88 PID 4136 wrote to memory of 712 4136 net.exe 88 PID 4136 wrote to memory of 712 4136 net.exe 88 PID 680 wrote to memory of 3128 680 cmd.exe 90 PID 680 wrote to memory of 3128 680 cmd.exe 90 PID 680 wrote to memory of 3128 680 cmd.exe 90 PID 3116 wrote to memory of 3448 3116 Logo1_.exe 56 PID 3116 wrote to memory of 3448 3116 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\d67ac5e64ec598de0cb673b2fe91d39e0e6266839c65a1aff50d0f4cd04d2902.exe"C:\Users\Admin\AppData\Local\Temp\d67ac5e64ec598de0cb673b2fe91d39e0e6266839c65a1aff50d0f4cd04d2902.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aA7AA.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\d67ac5e64ec598de0cb673b2fe91d39e0e6266839c65a1aff50d0f4cd04d2902.exe"C:\Users\Admin\AppData\Local\Temp\d67ac5e64ec598de0cb673b2fe91d39e0e6266839c65a1aff50d0f4cd04d2902.exe"4⤵
- Executes dropped EXE
PID:3128
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:712
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD593f519cff679e7b6e64c9614de12fc9f
SHA1dc9d9aca77a2e25fb60de1b265cd01c34a995d99
SHA2565efb27d83589653c07ce6387857b55e515c2bcc44629cab983924b8de0a26d75
SHA5121a8b7798208eccc2dfcf417f6ff7d03f5b17b60fd3d765ec34a994ea55e21fea0806f8a1f6e1e0b7275a4128b721a91126580b325428036d761790e71bf8bfcc
-
Filesize
570KB
MD538f5ea245b75cb8015aafaf25588f0b4
SHA160c1d7dc660c4842a11520faae4f098eb508a407
SHA2562c33796bf10eaa2b138d46965874c3a93b6b32523c64f11e66dadc6cafe87f61
SHA5124750db5114bf62941bce82e04c2d0a7db5da4cc00520be22575c876b37cd0e0a271c9c4d1d30c1a82ed67a31dfea39f58a96c41db5b5b8297eba0c308c036d79
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD5bdf1ffad58106eb7673a123a8553d84e
SHA174d6809f98c6dacdb3709eb6e9ec6523d241817c
SHA256130f50168a4775ca9e4dcdb71be811529a91fe3c72d0d28defc34b8d47463755
SHA51270dbe659c56b9490c49d6a0369abd42e497b117109347a61207b94bb9f28724b5935beaf1b30fc030566e26be6f8bf8a64c9fd63ee87db506637bc9ff95e509e
-
C:\Users\Admin\AppData\Local\Temp\d67ac5e64ec598de0cb673b2fe91d39e0e6266839c65a1aff50d0f4cd04d2902.exe.exe
Filesize762KB
MD5e6ce6c136740c736fd5be4e18de82117
SHA1cca1b677d6a97ffb121a25a1e2d36b0b03ddb9ea
SHA256c623f1c54437a44ae29701e6b9c3e68f9fe6ffbde06d23fffc1d7843c9b1331d
SHA5126a50b7325bce263f8d74a8b1216bd9307385972492414c3d1595f99833e5f6abd4fc2676eb0df0f49c012ac9e3fbeaca3d4723df5ecc1f7faa1ee1ea180fff52
-
Filesize
26KB
MD5b9140d6f36bb122548defc0b0a24e725
SHA11a175c2c6ae6c8b568a82a48efd8123dc0885e53
SHA256e473a9027f0e71b2a0aeae9a54b30e49d8fc3aa150f89c54ac019a9e50276aca
SHA5125824b68d3f922843214d782d925b761b9659de109fcc7e41e799f5f2f4a2e774e9caab5b4ed90b73cd6c30952b89fb9341da93a9932a3d519e2747a6d002c572
-
Filesize
8B
MD5a451cf229ab77d19c624b2e48ac11ec8
SHA10f3002921952d4e528750030d6340b77d10b5fc9
SHA25696a8bb2a4a11f6596cd7c59eee4a5ea4dcfb02550aadc0b233e6cc269883f222
SHA512699a221508bfee448d09720da926c818de965de39253e6c82fe79343d2916c59edb97ae5dc6d1e3b6343928fcefb636f5dfa13507e5ec53b3c4eeb1266caa3cd